- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Archive for category Comms
NSA Targeted TOR Network With Malware
Posted by Brian in Comms, News, Threat Watch on 8/Aug/2013 13:06
From BoingBoing.net:
Initial investigations traced the address to defense contractor SAIC, which provides a wide range of information technology and C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance) support to the Department of Defense. The geolocation of the IP address corresponds to an SAIC facility in Arlington, Virginia.
Andriod Backup Services May Not Be Secure
If you use an Android device you may want to review how you store your settings and passwords.
From the Electronic Frontier Foundation:
If you have a recent Android phone or tablet, chances are you take advantage of a convenient feature to backup your application settings and wireless network passwords. This feature is enabled by default in Android 2.2 and later, and it can make switching to a new device or replacing a lost phone a quicker process. If you haven’t examined all the settings for your phone, you might not know if this setting is enabled.
E4-Bs To Get Upgraded
From Defense Industry Daily:
In December 2005, the U.S. Air Force awarded Boeing a contract as Product Support Integrator (PSI) for the USAF’s E-4 National Airborne Operations Center fleet. These four 747-200 derivatives were introduced in 1974, and serve as complete flying command posts for national and military authorities. As one might imagine, they are hardened to resist the side-effects of nuclear attack, such as electro-magnetic pulse effects.
The 2005 contract was a 5-year, indefinite delivery/indefinite quantity contract vehicle, with one 5-year option and a $2 billion cost cap. It continues a long history of support from Boeing.
Creating and Managing Passwords: How the Experts Do It
Posted by Brian in Comms, Opinion, Threat Watch on 15/Jul/2013 12:12
From Ars Technica:
I recently checked in with five security experts to learn about their approach to choosing and storing crack-resistant passwords. They include renowned cryptographer Bruce Schneier, who is a “security futurologist” at BT and recently joined the Electronic Frontier Foundation’s board of directors; Adriel T. Desautels, CEO of Netragard, a firm that gets paid to hack large companies and then tell them how it was done; Jeremiah Grossman, founder and CTO of WhiteHat Security; Jeffrey Goldberg, “defender against the dark arts” at AgileBits, a company that develops the popular 1Password password manager; and Jeremi Gosney, a password security expert at Stricture Consulting.
Why ‘I Have Nothing to Hide’ Is the Wrong Way to Think About Surveillance
Posted by Gary in Comms, Law, News, Threat Watch on 13/Jun/2013 14:46
The problem is that “good” people almost never see how fascist government actions will ever effect them. They just don’t think that way. They believe as long as they are law abiding, the government will never do them harm. But ask someone who lived with the Stazi (Ministry for State Security) in East Germany or the KGB (Committee for State Security) in the Soviet Union, watching their every move. They can tell you why you should be afraid, and there are plenty of them still around to talk to. If we don’t stop this now we will probably never again have the chance.
From: Wired
If the federal government can’t even count how many laws there are, what chance does an individual have of being certain that they are not acting in violation of one of them?
President Obama says he’s not Big Brother, NPR responds.
Posted by Gary in Comms, Law, News, Threat Watch on 11/Jun/2013 10:01
NPR is, in my opinion, the undisputed master of ultra-subtle propaganda. The publicly funded “News” organization is actually a chillingly effective tool of Collectivism and Big (Brother) Government. Effective because most of my right-leaning moderate friends can see no manipulation at all. After reading this piece on what NPR calls “Our Surveillance Society” you most likely will consider it balanced and objective. And yet I feel like a hound that can’t get the blaring tea kettle sound from two blocks away out of his head, while no one around him can hear it at all. Well at least they bothered to write something instead of ignoring it. That in and of itself, plus the exquisite subtlety of the propaganda, is an indication of just how onerous these unconstitutional actions are.
From: NPR
President Obama says he’s not Big Brother. The author who created the concept might disagree.
Addressing the controversy over widespread government surveillance of telephone records and Internet traffic Friday, Obama said, “In the abstract, you can complain about Big Brother and how this is a potential program run amok, but when you actually look at the details, then I think we’ve struck the right balance.”
New Night Vision With Heads Up Display
Posted by Brian in Comms, News, Optics, Warrior Tools on 25/May/2013 08:17
ITT Exelis has developed a new night vision goggle. From KitUp:
“You can have a heads up display inside the goggle which can be maps, images or GPS coordinates. You can configure it for text messages. This is a multi-faceted device. It allows us to take night vision technology and connect it to a tactical network…”
Chinese Hackers Breached Google’s Surveillance Database
Posted by Gary in Comms, News, Threat Watch on 21/May/2013 14:35
From: Threat Level
Hackers Who Breached Google in 2010 Accessed Company’s Surveillance Database
…The database contained years’ worth of information on law enforcement surveillance surveillance orders issued by judges around the country. The hackers were hoping to discover if law enforcement agents were investigating undercover Chinese intelligence operatives who were working out of the U.S.
Is It Illegal to Unlock Your Phone?
From: EFF
Is It Illegal To Unlock a Phone? The Situation is Better – and Worse – Than You Think
Legal protection for people who unlock their mobile phones to use them on other networks expired last weekend. According to the claims of major U.S. wireless carriers, unlocking a phone bought after January 26 without your carrier’s permission violates the Digital Millennium Copyright Act (“DMCAâ€) whether the phone is under contract or not. In a way, this is not as bad as it sounds. In other ways, it’s even worse.
Joe Biden Accidentally Helped Us All E-Mail in Private
Posted by Gary in Comms, Law, Threat Watch on 17/Dec/2012 15:28
From: Danger Room
In the late ’80s and early ’90s, Phil Zimmermann was a Colorado peacenik with a half-written program that he swore would one day let people exchange messages without Big Brother peering inside. The problem was, with a freelance job and two kids, Zimmermann could never quite find the time to finish the damn code — until Joe Biden came along.